I came across this on the 7th of last month, reading up more on it, exploring the limited info available, discussing it with some people and drawing
future scenarios before deciding to post this.
Source: Wired Science
Hackers who commandeer your computer are bad enough. Now scientists worry that someday, they’ll try to take over your brain.
In the past year, researchers have developed technology that makes it possible to use thoughts to operate a computer, maneuver a wheelchair or even
use Twitter — all without lifting a finger. But as neural devices become more complicated — and go wireless — some scientists say the risks of
“brain hacking” should be taken seriously.
“Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future,” said computer security expert Tadayoshi
Kohno of the University of Washington. “But if we don’t start paying attention to security, we’re worried that we might find ourselves in five
or 10 years saying we’ve made a big mistake.”
As neural engineering becomes more complex and more widespread, the potential for security breaches will mushroom.
Download the full article here
Although this article talks about the inherent dangers that may arise 10 years down the line, lets understand the clear and present danger that we are
Surgical implants are becoming increasingly common in both research and medicine. These include implantable medical devices (IMDs) such as
pacemakers, implantable cardioverter deﬁbrillators (ICDs), neurostimulators, and implantable drug pumps use embedded computers and radios to monitor
chronic disorders and treat patients with automatic therapies.
These implants are designed to be surgically implanted and controlled, by a wireless link, like a TV remote. Anyone with the right remote can change
the channel. Granted the control is in the hands of a few, but it can be hacked!
Which simply means, that if you are one with a surgically implemented implant, a hacker ( read individual/private organisation/government) can shut
you down. And there is nothing that you can do about it, as of now.
I draw your attention to this site
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Lets take a look at the attack vectors
In the attack simulation that was carried out, the follwing vectors were explored
INTERCEPTING ICD COMMUNICATIONS
b)Eavesdropping with a Commodity Software Radio
c)Intercepting Patient Data
ACTIVE ATTACKS WITH A COMMODITY SOFTWARE
a) Triggering ICD identiﬁcation
b) Disclosing patient data.
c) Disclosing cardiac data.
d) Changing patient name.
e) Setting the ICD’s clock.
f) Changing therapies.
g) Inducing ﬁbrillation.
h) Power denial of service attack.
i) Other attack vectors - such as insecure software updates or buffer overﬂow vulnerabilities.
Although open to modifications and improvements, the current scenario is that anyone with enough knowledge and a commercial software radio can
not only eavsdrop on your privacy, but also shut you down, without your knowledge
. The potential for misuse cannot be grossly overstated.
Its important that this information is made available to those with or about to go in for implants, which while saving lives, can also be The
Next Hacking Frontier! Your Brain??a doule edged weapon in the hands of the malicious.
Comments please, and thanks for reading this through!
The Next Hacking Frontier! Your Brain??